When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...

Designed for SMBs, Branch Offices and Remote Workers, New Software Appliance Provides the Same Seamless Access as On-Premise Infrastructure, but with the Ability to Leverage the Cloud Palo Alto, Calif. - July 22, 2014 - CloudSigma, a public cloud IaaS provider with advanced hybrid host...

By David Parkinson, strategic development manager, UK & Ireland, for Wick HillIt's not often that news from the information security industry reaches the early evening TV slots. However, the major disruption caused recently to the Gameover Zeus (GOZ) botnet certainly did. In a coll...

OK, I’m excited. The latest release of Neverfail IT Continuity Architect has landed with some of our most requested features and we just can’t wait for you to try it out for yourselves. When I got walked through a demo of the new features last week I knew this was Continue ...

Amazon Web Services announced S3 SSE-C today; an enhancement allowing AWS S3 users to feed customer-generated keys to its S3 Server Side Encryption, which previously only allowed keys to be managed by Amazon itself. This is a great addition to the S3 feature set, and is a very usable w...

By Ed Scannell, Senior Executive Editor LAS VEGAS – Hoping to better secure corporate data from increasingly sophisticated hackers, HP’s new capabilities allow IT pros to encrypt data at the point of its creation, whether it resides in the cloud or on-premises. HP Atalla Cloud En...

We’re well into a phase of unpredictable data growth. As so many organizations have discovered in recent years, unpredictable data growth means significant increases in risk and in the complexity of data management. The proliferation of data silos due to data deduplication is just one ...

At healthcare events throughout the world, we have met many health tech companies who are considering migrating to the cloud, but have serious concerns about protecting electronic protected health Information (e-PHI) and maintaining HIPAA compliance as they virtualize their environment...

The combination of cloud computing and big data is a match made in heaven. Big data requires a flexible compute environment, which can scale quickly and automatically to support massive amounts of data. Infrastructure clouds provide exactly that. But whenever cloud computing is discuss...

Last week, at the Amazon Web Services Summit in San Francisco’s Moscone Center, we met many companies who have deployed (or will migrate) their sensitive projects to the Amazon cloud. These companies expressed real concerns about the security of their information, and the status of co...

Ian Kilpatrick, chairman Wick Hill Group, looks at the current state of authentication and examines the solutions on offer from two companies in Gartner's Magic Quadrant. 123456. Amazingly, surveys show that this is the most popular password for authentication. And simple passwords are...

#sdas #virtualization Scaling virtual infrastructure is one thing, managing it is another When virtualization first took off there was a fear - and it was a valid fear - of virtual sprawl. Virtual sprawl was the end result of spawning lots and lots of virtual machines and then essenti...

#RSAC #F5 #infosec #sdas #webperf Security and performance can coexist. Security is an integral part of what F5 is all about. It's our mission to deliver secure, reliable and fast applications to anyone, anywhere at any time and we take all three of those goals very seriously. From ha...

“The Cloud” has become almost synonymous with “agility.” Next to the economic benefits of moving projects to the cloud, the most visible benefit is the ability to deploy applications of any size at will, and to terminate them as soon as they are no longer needed. Agility is manifested ...

Cloud computing changes the way companies consume IT resources. It shifts the burden of purchasing and maintaining IT infrastructure to specialized IT providers and allows the users to pay only for the resources they need, when they need them. In this new paradigm, cloud security is a ...

The 20 Coolest Cloud Security Vendors Of The 2014 Cloud 100 The growing use of Web-based services and the frequent deployment of cloud-hosted server deployments have forced traditional security vendors to offer SaaS security offerings and prompted the emergence of a new breed of...

Moving to an Infrastructure as a Service cloud is the natural evolution of IT at an increasing number of companies. But with a fundamental systematic change like cloud adoption comes new responsibility. Most organizations migrating to the cloud are concerned with cloud security. We are...

Now that we have installed and configured the vCAC 6.0 Identity Appliance and the vCAC 6.0 Virtual Appliance we now need to install the vCAC 6.0 IaaS Server. The IaaS server is all the former vCAC 5.x and earlier components. The vCAC 6.0 IaaS Server includes the following components: I...

It’s been an exciting year for us at Neverfail – and at the center of that excitement is our newest product, IT Continuity Architect. Today, we are pleased to announce the general availability of this award-winning solution and highlight its momentum to-date. Since we launched the tech...

We’re excited to announce the release of the Porticor Encryption Agent, our latest addition to the Porticor Virtual Appliance, as part of our continuous efforts to provide flexible deployment options of our encryption and key management solution. With the Porticor Encryption Agent, cu...

There are two scenarios when you want to create a RAID pair of Porticor protected disks on your Windows Server: 1. When you have 2 new disks and want to create a RAID pair from scratch. 2. When you already have a disk with data and want to add a mirror to it. The first [...]The post Ho...

As the infrastructure cloud market (IaaS and PaaS) continues to grow rapidly, we are seeing quite a few customers who are delivering an application – whether it is a mission-critical or SaaS application – and basing their solution on VMware.
VMware Security Cloud Encryption cloud keyb...

ViPR is not a technology creation developed in a vacuum instead includes customer feedback, wants and needs. Its core themes are extensible, open and scalable.
What is ViPR addressing?
IT and data infrastructure (server, storage, IO and networking hardware, software) challenges for t...

EMC ViPR software defined object storage part III
By Greg Schulz
This is part III in a series of posts pertaining to EMC ViPR software defined storage and object storage. You can read part I here and part II here.
More on the object opportunity
Other object acces...

Lichfield, 31 January 2013 - To support the expanding role of access control solutions that leverage the intelligence of the network, NextiraOne UK, part of Europe's leading expert in communications services, has announced today that it has achieved Identity Services Engine (ISE) Autho...

Overview Welcome to Porticor! At a high level, the steps involved in using Porticor on SCE are: Create a storage unit (disk). Create a Porticor virtual appliance (an instance). Activate the instance. Configure the instance. This article goes through each of the steps. Please read it th...

After completing the wizard process, and signing in to your Porticor Virtual Appliance console, you’ll get to the “Master Key” page. This page will appear one time only per project. The Master Key guarantees that only you control your data. It is important you copy and save this key in...

Using Porticor to encrypt your S3 storage is easy, once you get the hang of it. The first time though, I recommend that you go through these steps one by one, without cutting any corners. Step 1: Creating Your Porticor Project This is documented in this Knowledge Base article. Step 2: ...

This post, as well as the public evaluation is intended for Amazon Web Services customers. If you are using a different platform (such as Rackspace, HP or Microsoft Azure), our “Enterprise” version may be right for you. Please Contact us for further details. You might also ...

Gladinet Cloud Enterprise was released in 2012. The goal was to help businesses create a self-hosted file sync & share solution (dropbox-like solution) by leveraging business’s own file server and existing Active Directory services. As

Your Porticor appliance can encrypt data being stored to Amazon’s Simple Storage Service (S3). Porticor is the only system available that offers the convenience of cloud-based hosted key management without sacrificing trust by requiring someone else to manage the keys. Porticor’s...

The data centers of the future may look more like NASA ground control – governance inside, resources out
One theme has remained consistent throughout the evolution of cloud thus far - enterprise IT wants to retain control of both its data and access to to it.
This is not an unreasona...

We’ve released a new video describing how to initialize a new Porticor Virtual Appliance in AWS. The video describes the steps needed to create a new Porticor Virtual Appliance, create an encrypted disk, and mount it to the application: For a product overview click here For the w...

Virtual Application Appliances (VAA) decouple an application from the operating system (OS) and its underlying infrastructure. The resultant virtual application appliance contains an application with its dependencies, but with zero operating system (zeOS) component. The aim of VAAs is to enable enterprises to provision server based applications to any machine in the data center in a matter of seconds or move an application from the data center to the cloud (D2C).

Cloud Expo

Cloud Computing & All That
It Touches In One Location Cloud Computing - Big Data - Internet of Things
SDDC - WebRTC - DevOps
Cloud computing is become a norm within enterprise IT.

The competition among public cloud providers is red hot, private cloud continues to grab increasing shares of IT budgets, and hybrid cloud strategies are beginning to conquer the enterprise IT world.

Big Data is driving dramatic leaps in resource requirements and capabilities, and now the Internet of Things promises an exponential leap in the size of the Internet and Worldwide Web.

The world of SDX now encompasses Software-Defined Data Centers (SDDCs) as the technology world prepares for the Zettabyte Age.

Add the key topics of WebRTC and DevOps into the mix, and you have three days of pure cloud computing that you simply cannot miss.

Delegates will leave Cloud Expo with dramatically increased understanding the entire scope of the entire cloud computing spectrum from storage to security.

Cloud Expo - the world's most established event - offers a vast selection of 130+ technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies. The floor also features two Demo Theaters that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.

Attend Cloud Expo. Craft your own custom experience. Learn the latest from the world's best technologists. Find the vendors you want and put them to the test.